期刊文献+

网络数据库访问路径关联特征分析查询优化 被引量:6

Correlation Feature Analysis and Query Optimization of Network Database Access Path
在线阅读 下载PDF
导出
摘要 网络数据库具有动态和不确定性,对其有效访问可以提高对网络大数据的挖掘和数据查询能力。网络数据库的访问路径的关联特征分析是实现数据库优化查询的有效途径,传统的网络数据库访问路径关联特征分析方法采用平均互信息关联维提取算法,当关联维特征出现独立同分布状态时,提取性能受限。提出一种数据流相邻时间段模式匹配的网络数据库访问路径关联特征分析算法,实现对数据流查询的优化设计。根据点的位置以及数据块在各维上最大长度,判断是否存在一个包含该点的簇,在新的数据流到达系统时,触发事件并将参数数据插入参数窗口中保存。查询节点数据分发直接信任值为前一周期信任值衰减后与当前信任值的平均值,建立等值查询条件机制,进行数据流相邻时间段模式匹配,在属性值和用户检索机制中设定查询条件,进行特征关联。仿真结果表明,该算法在维度和数量级足够大的时,在Esper中应用流聚类算法在稳定性一致的基础上,网络数据库访问有明显的时间优势。数据访问的耗时较传统方法有所减少,展示了算法对数据库访问路径规划和数据查询的优越性能。 In the paper, a new correlation feature analysis algorithm was proposed based on data flow pattern matching, to realize the optimal design of data stream query. According to the position of point and the maximum length of data blocks in each dimension, whether there exists a cluster containing the point was determined, and when new data stream arrives at the system, the events were triggered and the parameter data were inserted into the parame- ter window to save. The node data were queried to distribute the direct trust values which were the average values of previous cycle trust attenuation values and current trust values, and the equivalent query mechanism was established. The pattern matching with data flow in adjacent time was implemented, and the query condition was set in property value and user retrieval mechanism, to make feature association. Simulation results show that if the dimension and quantity are large enough, on the basis of the consistent stability of application stream clustering algorithm in Esper, network database access has obvious advantage in time by using this algorithm. The time consuming of data access has been reduced, and the superiority of the algorithm has demonstrated for the database access path planning and data query.
作者 张延芳 袁浩
出处 《计算机仿真》 CSCD 北大核心 2015年第9期437-440,共4页 Computer Simulation
关键词 网络数据库 数据挖掘 访问 特征分析 Network database Data mining Access Feature analysis
  • 相关文献

参考文献6

  • 1P Corke and P Sikka. Demo abstract: FOS - a new operating sys- tem for sensor networks[ C]. In Proceedings of Fifth European con- ference on wireless sensor networks (EWSN) , 2008 : 1145-1151.
  • 2C T Cheng, H Leung, P Maupin. ADelay-Aware Network Struc- ture for wireless sensor networks with In-network data fusion [ J]. IEEE Sensor Journal, 2013,13 (5) : 1622-1631.
  • 3杨庚,李森,陈正宇,许建,杨震.传感器网络中面向隐私保护的高精确度数据融合算法[J].计算机学报,2013,36(1):189-200. 被引量:45
  • 4D Baron, M B Wakin, S Sarvotham. Distributed Compressed Sens- ing[ R]. Rice University, 2006.
  • 5J A Tropp and A C Gilbert. Signal recovery from partial information by orthogonal matching pursuit[ J]. IEEE Transactions on informa- tion theory, 2007,53( 11 ) :4655-4666.
  • 6D L Donoho, I Drori, Y Tsaig and J L Starck. Sparse solution ofunderdetermined linear equations by stage wise orthogonal matching pursuit[J]. IEEE Transactions On Information Theory, 2012,58 (2) :1091-1121.

二级参考文献16

  • 1Madden S, Franklin M J, Hellerstein J M. TAG: A tiny ag gregation service [or ad hoc sensor networks//Proceedings o the 5th Symposium on Operating Systems Design and lmple mentation. New York, USA, 2002:131 146.
  • 2Yi Y Wang X R, Zhu S C, Cao G H. SDAP= A secure hop-by hop data aggregation protocol for sensor networks// Proceedings of the ACM Transactions on Information and System Security. New York, USA, 2008:143.
  • 3Eschenauer L, Gligor V. A key management scheme for distributed sensor networks//Proceedings of the 9th ACMConference on Computer and Communications Security. Washington, DC, USA, 2002:41 47.
  • 4Liu D G, Ning P. Establishing pairwise keys in distributed sensor networks//Proceedings of ACM Transactions on Information and System Security. New York, USA, 2005: 41 77.
  • 5Ruj S, Nayak A, Stojmenovic I. Fully secure pairwise and triple key distribution in wireless sensor networks using corn binatorial designs//Proceedings o[ the 30th IEEE Interna- tional Conference on Computer Communications. Shanghai, China, 2011:326-330.
  • 6Castelluccia C, Mykletun E, Tsudik G. Efficient aggregation of encrypted data in wireless sensor networks//Proeeedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. San Diego, USA, 2005:109-117.
  • 7He W B, Liu X, Nguyen H, Nahrstedt K, Abdelzaher T. PDA: Privacy preserving data aggregation in wireless sensor networks//Proceedings of the 26th IEEE International Conference on Computer Communications. Anchorage, AK, 2007, 2045-2053.
  • 8Yang Geng, Wang An Qi, Chen Zheng-Yu, Xu Jian, Wang Hai-Yong. An energy saving privacy-preserving data aggre- gation algorithm. Chinese Journal of Computers, 20ll, 34 (5) : 792-800(in Chinese).
  • 9Bista R, Kim D, Chang J. A new private data aggregation scheme for wireless sensor networks//Proceedings of the 2010 IEEE ]0th International Conference on Computer andInformation Technology. Bradford, West Yorkshire, UN, 2010:273-280.
  • 10Cristofaro E. A secure and privacy protecting aggregation scheme for sensor networks//Proceedings of the IEEE Inter- national Symposium on a World of Wireless, Mobile and Multimedia Networks. Espoo, Finland, 20Q7:1 5.

共引文献44

同被引文献49

引证文献6

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部